

In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.
OKWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
Where is the new “Security Stack” hiding?
/by Chris Lucas, CISSP, CCSKThe days of the traditional security stack are numbered, brought on by the maturity of shared resource computing and the rapid migration to the public cloud due to the COVID-19 pandemic. This blog will explore a brief history of fortification, its impact on the early internet security architectures, and today’s challenges.
The Impact of the ONC Cures Act on API Security
/by Jay Miller, Vice President, Commercial SalesONC Cures Act Final Rule, apart from providing patients and their healthcare providers secure yet seamless access to health information, aims to increase innovation and trigger competition. With more competition comes innovation, as new entrants offer much wider healthcare choices and solutions for patients. While the ONC Cures Act Final Rule aims to make healthcare information exchange easy through standardized APIs, these APIs are vulnerable to cyberattacks. Find out how cloud solutions can help enhance API security.
Understanding What’s In My Cloud
/by Dr. Mike Lloyd, CTO, RedSealToday’s business applications run in an environment that would be unrecognizable to IT professionals 10 years ago. The rise of virtualization and the cloud has finally cut the ties to specific hardware, and all but the most exotic workloads can now be run anywhere — on virtual machines in your physical buildings, or on a cloud vendor of your choice.
RedSeal and Cloud Security Posture Management
/by Bryan Barney, RedSeal CEOFor more than a decade, RedSeal has been in the business of helping customers understand their on-premise networks i.e. what devices are on the network, how they are connected, and the security implications of their configuration. Our mission is to provide organizations with technology that allows them to understand their network, hybrid, and cloud security posture.
CISA and FBI Publishes List of Top Vulnerabilities Currently Targeted by Foreign Sponsored Hacking Groups
/by Bill Burge, RedSeal Professional ServicesThe Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have jointly released a report on the top 10 vulnerabilities consistently being scanned, targeted, and exploited by foreign sponsored hacking groups.
Cyber Readiness Pillars and RedSeal
/by Wayne Lloyd, Federal CTO, RedSealOrganizations need a cybersecurity strategy to protect both infrastructure and customer data from growing cybersecurity threats and RedSeal professional services are the solution to all your cybersecurity answers.
Automation, Integration and RedSeal
/by John Bays, Senior Security Solutions Consultant, FederalOrganizations can become more resilient to cyber-attacks by directing all the resources to these problem-solving activities. To streamline security teams’ efforts, and further improve network security, RedSeal now integrates into the user interfaces of several leading security products.
Five Steps to Improve your Multi-Cloud Security
/by Kurt Van Etten, Chief Product Officer, RedSealThe rapid adoption of the cloud – in most cases multiple clouds – has created a rapid increase in security issues. Follow these five steps to discover how enterprises can address their cybersecurity framework issues directly.
The Real Reason for Breaches (and How to Avoid Them)
/by Dr. Mike Lloyd, CTO, RedSealSecurity is a tough job – we invest so much effort, and yet the breaches keep on happening. The way forward is to find what you have, in the cloud and across your physical sites, see how it’s all connected, and understand where you can block incoming attacks.
Experts Warn of Attacks on a Cisco ASA Security Flaw due to a new Proof-of-Concept Exploit
/by Heidi Gerken, Senior Sales EngineerA security flaw can allow an unauthenticated attacker to remotely conduct a cross site scripting (XSS) attack against a user of the web services interface. Enterprises should patch their Cisco ASA Software and Firepower Software as soon as possible.